Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-31 Thread Bruce Momjian
Tom Lane wrote: > Bruce Momjian <[EMAIL PROTECTED]> writes: > > I am confused because you say "dangling" then you say "to the real > > socket". You are saying it isn't dangling when the server is running? > > Exactly. When the server is running it provides a perfectly good path > to the postmast

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-18 Thread Magnus Hagander
On Fri, Jan 18, 2008 at 12:35:40PM +0100, Peter Eisentraut wrote: > Am Freitag, 18. Januar 2008 schrieb Magnus Hagander: > > Not that much more than moving the socket file to a secure directory. Both > > rely on configuring the client properly. It's arguably a lot easier to > > configure the client

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-18 Thread Peter Eisentraut
Am Freitag, 18. Januar 2008 schrieb Magnus Hagander: > Not that much more than moving the socket file to a secure directory. Both > rely on configuring the client properly. It's arguably a lot easier to > configure the client to connect to the correct socket, than to make sure > the client has a ro

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-18 Thread Magnus Hagander
On Fri, Jan 18, 2008 at 11:24:09AM +0100, Peter Eisentraut wrote: > Am Donnerstag, 17. Januar 2008 schrieb Andrew Dunstan: > > I agree. I remain of the opinion that this is not a problem than can be > > solved purely within the bounds of postgres. > > Well, the SSL patch I showed certainly solves

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-18 Thread Peter Eisentraut
Am Freitag, 18. Januar 2008 schrieb Alvaro Herrera: > I propose to create a dangling symlink on system startup in > /tmp/.s.PGSQL. to the real socket, which is not on a > world-writable directory.  This avoids the spoofer, because he cannot > create the socket -- the symlink is occupying its place.

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-18 Thread Peter Eisentraut
Am Donnerstag, 17. Januar 2008 schrieb Andrew Dunstan: > I agree. I remain of the opinion that this is not a problem than can be > solved purely within the bounds of postgres. Well, the SSL patch I showed certainly solves the problem. (I am not saying it is the best possible solution.) Of cours

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-18 Thread Peter Eisentraut
Am Donnerstag, 17. Januar 2008 schrieb Bruce Momjian: > It creates a lock file that is the same name as the socket file that a > default-configured client would use, so it prevents a spoofed socket > from being created. A counter-spoofing solution must be implemented in the client. No moving aro

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-18 Thread Greg Smith
On Thu, 17 Jan 2008, Tom Lane wrote: BTW, is a symlink's atime changed by accessing it? It seems so in the cases I've tried or researched, but it's complicated. After burning through a bunch of time looking into this I wanted to drop some notes so nobody else has to wander down the specific

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-17 Thread Andrew Dunstan
Alvaro Herrera wrote: Andrew Dunstan wrote: Alvaro Herrera wrote: Andrew Dunstan wrote: I agree. I remain of the opinion that this is not a problem than can be solved purely within the bounds of postgres. I agree. Please comment on my proposed solution.

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-17 Thread Bruce Momjian
Tom Lane wrote: > Bruce Momjian <[EMAIL PROTECTED]> writes: > > I am confused because you say "dangling" then you say "to the real > > socket". You are saying it isn't dangling when the server is running? > > Exactly. When the server is running it provides a perfectly good path > to the postmast

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-17 Thread Bruce Momjian
Bruce Momjian wrote: > Alvaro Herrera wrote: > > > I'm not sure tmp cleaners will work that well against a determined > > > spoofer. > > > > I don't understand. The tmp cleaner is something we have to _avoid_. > > Let me repeat my proposal. > > > > I propose to create a dangling symlink on syst

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-17 Thread Tom Lane
Bruce Momjian <[EMAIL PROTECTED]> writes: > I am confused because you say "dangling" then you say "to the real > socket". You are saying it isn't dangling when the server is running? Exactly. When the server is running it provides a perfectly good path to the postmaster. The point (and the main

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-17 Thread Bruce Momjian
Alvaro Herrera wrote: > > I'm not sure tmp cleaners will work that well against a determined spoofer. > > I don't understand. The tmp cleaner is something we have to _avoid_. > Let me repeat my proposal. > > I propose to create a dangling symlink on system startup in > /tmp/.s.PGSQL. to the real

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-17 Thread Tom Lane
Alvaro Herrera <[EMAIL PROTECTED]> writes: > I propose to create a dangling symlink on system startup in > /tmp/.s.PGSQL. to the real socket, which is not on a > world-writable directory. This avoids the spoofer, because he cannot > create the socket -- the symlink is occupying its place. > The o

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-17 Thread Alvaro Herrera
Andrew Dunstan wrote: > > > Alvaro Herrera wrote: >> Andrew Dunstan wrote: >> >> >>> I agree. I remain of the opinion that this is not a problem than can be >>> solved purely within the bounds of postgres. >> >> I agree. Please comment on my proposed solution. > > I'm not sure tmp cleaners wil

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-17 Thread Andrew Dunstan
Alvaro Herrera wrote: Andrew Dunstan wrote: I agree. I remain of the opinion that this is not a problem than can be solved purely within the bounds of postgres. I agree. Please comment on my proposed solution. I'm not sure tmp cleaners will work that well against a determined

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-17 Thread Alvaro Herrera
Andrew Dunstan wrote: > I agree. I remain of the opinion that this is not a problem than can be > solved purely within the bounds of postgres. I agree. Please comment on my proposed solution. -- Alvaro Herrerahttp://www.CommandPrompt.com/ PostgreSQL Replication

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-17 Thread Andrew Dunstan
Tom Lane wrote: Bruce Momjian <[EMAIL PROTECTED]> writes: Peter Eisentraut wrote: How does that prevent spoofing? It creates a lock file that is the same name as the socket file that a default-configured client would use, so it prevents a spoofed socket from being created

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-17 Thread Tom Lane
Bruce Momjian <[EMAIL PROTECTED]> writes: > Peter Eisentraut wrote: >> How does that prevent spoofing? > It creates a lock file that is the same name as the socket file that a > default-configured client would use, so it prevents a spoofed socket > from being created. Only if the attacker didn't

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-17 Thread Bruce Momjian
Peter Eisentraut wrote: > Bruce Momjian wrote: > > I have written the following documentation addition suggesting the use > > of external_pid_file. > > How does that prevent spoofing? It creates a lock file that is the same name as the socket file that a default-configured client would use, so it

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-17 Thread Peter Eisentraut
Bruce Momjian wrote: > I have written the following documentation addition suggesting the use > of external_pid_file. How does that prevent spoofing? -- Peter Eisentraut http://developer.postgresql.org/~petere/ ---(end of broadcast)--- TIP 1: if p

Re: [PATCHES] [HACKERS] SSL over Unix-domain sockets

2008-01-16 Thread Bruce Momjian
Bruce Momjian wrote: > Tom Lane wrote: > > Conclusions: > > > > * SSL, even without real authentication, is *way* too expensive to > > enable by default. > > > > * The extra cost of going across a local TCP connection is measurable, > > but it's insignificant compared to the cost of turning on SS